Network Access Control (NAC)

The Challenge

Friend or foe identification: how can we tell who is an authorized organizational network user and who attempts to gain illegal access? How do we identify malicious outsiders trying to connect?

Current business reality means multiple outside users attempting to gain access to the core of the company’s computer array.

Current business reality means multiple outside users attempting to gain access to the core of the company’s computer array (such as external suppliers who access the ERP, employees accessing their calendars, emails and organizational databases, as well as sales teams entering the orders management systems), using a huge range of platforms and devices, such as smartphones, tablets, laptops, computerized control systems, and so on.

Given the huge range of platforms and devices, such as smartphones, tablets, laptops, computerized control systems, and so on.

Organizations must now verify all these users have authorized access to the database and information systems, and to immediate thwart any unauthorized, malicious attempt to enter the IT network, as they can be used to take advantage of security breaches and cause untold damages to the corporate business and reputations.

In order to prevent hostile users from contaminating the organization’s computer network with a Trojan virus, copy data or steal it, or corrupt the database, organizations must be capable of verifiable identification of any platform which interfaces with the organization’s network – before granting authorized access. In the event the user’s platform does not meet the corporate standards, set by the organization’s data security manager, the user is neutralized and blocked in real time.

“Though we cannot control what happens to us, we can control what happens inside us.”
Benjamin Franklin, 1706-1790
Benjamin Franklin

The Solution

Spider Solutions’ chosen set of solutions for this challenge of Network Access Control (NAC) is executed using software which come from the world’s leading vendors.

We use them to identify devices attempting to connect to the organizational network, classify them as authorized or hostile, blocking them if need be and issuing alerts for the organization’s data security managers.

Primary Features

  • Blocking suspected attempts to enter the organizational network
  • Geo-Location based monitoring and identification
  • Simple installation and imbedding
  • Supports Bring Your Own Device (BYOD) solutions
  • Supports all network types: VPN, Wireless and fixed-line

Best of Breed: Choosing the best product:

After carefully exploring software vendors and existing on the shelf technologies, we at Spider Solutions have chosen as our business partners for Network Access Control products manufactured by: ForeScout, Portnox.

forescout portnox

Spider Solutions’ service concept:

We place the highest emphasis on prompt, professional, courteous and efficient service, so we dedicate a great deal of time and resources in training our employees and certifying them by the leading software and hardware companies, our business partners.

Call center

Spider Solutions’ call center, which is on call 24/7, is fully staffed with data security engineers at our clients’ disposal.